Description
Jenkins eggPlant Plugin 2.2 and earlier stores credentials unencrypted in job config.xml files on the Jenkins master where they can be viewed by users with Extended Read permission, or access to the master file system.
Remediation
References
http://www.openwall.com/lists/oss-security/2019/08/07/1
https://jenkins.io/security/advisory/2019-08-07/#SECURITY-1430
https://www.zerodayinitiative.com/advisories/ZDI-19-834/
Related Vulnerabilities
CVE-2020-7663 Vulnerability in npm package websocket-extensions
CVE-2020-26939 Vulnerability in maven package org.bouncycastle:bcprov-ext-jdk15on
CVE-2021-44832 Vulnerability in maven package org.apache.logging.log4j:log4j-core
CVE-2020-15262 Vulnerability in npm package webpack-subresource-integrity
CVE-2023-30429 Vulnerability in maven package org.apache.pulsar:pulsar-broker-common